White Papers by Topic: Endpoint protection

Resources available: 6

Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution

In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence point for other endpoint management and control functions.

Pragmatic Endpoint Management: Empowering an SMB Workforce in the Age of Mobility

Lacking the time for proper training and education, SMB administrators often resort to taking shortcuts to keep their environment running.This paper discusses the challenges of managing different endpoints in SMB-sized organizations.

Backup Deep Dive Report

Does your backup system feel about as modern as the 8-track stereo sitting in your garage? Is it just as reliable? Maybe it's time to bring your backup and recovery system into the 21st century.

Eight threats your anti-virus won't stop: Why you need endpoint security

News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes. This paper outlines eight common threats that traditional anti-virus alone won't stop, and explains how to protect your organization using endpoint security.

A Comprehensive Framework for Securing Virtualized Data Centers

Understand the real need for security solutions that can address the reality of expanding virtualization.

Strategies for Endpoint Security

Who would have thought that after 20-plus years of solid research and industry remedies that malware would still be a common malady on today’s PCs? This is not to say that the problem of computer viruses and trojans hasn’t changed…it has significantly. But today’s Internet-connected, application-integrated, global world makes it far easier for malware to sneak onto our computers to do bad things. Download this original InfoWorld report, "Strategies for Endpoint Security".

©1994-2014 Infoworld, Inc.